Unlock instant, AI-driven research and patent intelligence for your innovation.

Monitoring equipment authentication method and device

A technology of monitoring equipment and authentication method, which is applied in the direction of TV, closed-circuit television system, electrical components, etc., can solve the problems of complex password management and easy information leakage, and achieve the effect of fast and safe authentication

Active Publication Date: 2019-12-13
ZHEJIANG UNIVIEW TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, access control and authentication protocols (for example, 802.1x) are generally used to perform security authentication on monitoring devices connected to the network. However, the above security authentication methods have the disadvantages of complex password management and easy information leakage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Monitoring equipment authentication method and device
  • Monitoring equipment authentication method and device
  • Monitoring equipment authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0036] Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art wi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a monitoring device authentication method and apparatus. The method comprises the following steps: a switch generates a random code, encrypts the random code by a public key of a monitoring device to obtain first encryption contents, and sends the first encryption contents to the monitoring device; the monitoring device decrypts the first encryption contents via a private key of the monitoring device to obtain the random code; the monitoring device encrypts the random code and feature information of the monitoring device by the public key of the switch to obtain second encryption contents, and sends the second encryption contents to the switch; and the switch decrypts the second encryption contents by the private key of the switch to obtain the random code and the feature information, judges whether the random code is generated by the switch, and executes a corresponding preset operation on the feature information according to a judgment result. By adoption of the monitoring device authentication method and apparatus, the monitoring device authentication management work become simpler, the information leakage risk is smaller, and the safety authentication of the monitoring device can be rapidly completed.

Description

technical field [0001] The invention relates to the technical field of security authentication of monitoring equipment, in particular to a method and device for monitoring equipment. Background technique [0002] In order to make the monitoring network cover the target monitoring area (for example, parks, underground parking garages, etc.) Accessing the monitoring network by replacing monitoring equipment threatens the security of the entire monitoring network. Therefore, it is very necessary to carry out security certification on monitoring equipment. In the prior art, access control and authentication protocols (for example, 802.1x) are generally used to perform security authentication on monitoring devices connected to the network. However, the above security authentication methods have the disadvantages of complex password management and easy information disclosure. Contents of the invention [0003] In order to overcome the above-mentioned shortcomings in the prior ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04N7/18
CPCH04L63/0442H04L63/08H04N7/181
Inventor 周迪任俊峰
Owner ZHEJIANG UNIVIEW TECH CO LTD